Impact
ImageMagick libraries encode images in UIL and XPM formats without validating the pixel index returned by GetPixelIndex(). In builds where Quantum is a floating-point type, negative indices can be produced, allowing a crafted image to overflow a buffer read. The resulting out‑of‑bounds read can leak memory contents to the calling process or cause a crash, potentially exposing sensitive data or interrupting service but does not provide remote code execution. The vulnerability is classified under CWE‑125 – Out‑of‑Bounds Read.
Affected Systems
Any deployment of ImageMagick prior to version 7.1.2‑15 and 6.9.13‑40 is susceptible. The affected product is the ImageMagick library, used by a wide range of image‑processing applications, both on servers and on client machines. Versions older than the stated thresholds lack the patch that validates the pixel index before array subscripting.
Risk and Exploitability
The CVSS score of 6.5 indicates medium severity, while the EPSS score of less than 1% suggests a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker to supply a malicious image that the vulnerable application processes, which can be achieved via remote upload or local privilege if the application is invoked with user data. The lack of code‑execution capability keeps the risk moderate, but the information disclosure angle motivates prompt remediations.
OpenCVE Enrichment
Debian DLA
Debian DSA
Github GHSA
Ubuntu USN